]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/commitdiff
staging: ccree: fix cc_crypto_ctx.h white spaces
authorGennadii Altukhov <grinrag@gmail.com>
Fri, 26 May 2017 09:28:47 +0000 (11:28 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 29 May 2017 14:49:56 +0000 (16:49 +0200)
Fix checkpatch.pl reported checks: spaces preferred around '/' and '<<' in cc_crypto_ctx.h

Signed-off-by: Gennadii Altukhov <grinrag@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/staging/ccree/cc_crypto_ctx.h

index ac39d349060d3076432273525189c735d86d2f90..2fabb5ca3f41f64ead3e44bc3934489db40fa92a 100644 (file)
@@ -28,7 +28,7 @@
 #define CC_CTX_SIZE_LOG2 7
 #endif
 #endif
-#define CC_CTX_SIZE (1<<CC_CTX_SIZE_LOG2)
+#define CC_CTX_SIZE (1 << CC_CTX_SIZE_LOG2)
 #define CC_DRV_CTX_SIZE_WORDS (CC_CTX_SIZE >> 2)
 
 #define CC_DRV_DES_IV_SIZE 8
@@ -224,7 +224,7 @@ struct drv_ctx_hmac {
        enum drv_crypto_alg alg; /* DRV_CRYPTO_ALG_HMAC */
        enum drv_hash_mode mode;
        u8 digest[CC_DIGEST_SIZE_MAX];
-       u32 k0[CC_HMAC_BLOCK_SIZE_MAX/sizeof(u32)];
+       u32 k0[CC_HMAC_BLOCK_SIZE_MAX / sizeof(u32)];
        u32 k0_size;
        /* reserve to end of allocated context size */
        u8 reserved[CC_CTX_SIZE - 3 * sizeof(u32) -
@@ -248,8 +248,8 @@ struct drv_ctx_cipher {
        u8 xex_key[CC_AES_KEY_SIZE_MAX];
        /* reserve to end of allocated context size */
        u32 reserved[CC_DRV_CTX_SIZE_WORDS - 7 -
-               CC_AES_BLOCK_SIZE/sizeof(u32) - 2 *
-               (CC_AES_KEY_SIZE_MAX/sizeof(u32))];
+               CC_AES_BLOCK_SIZE / sizeof(u32) - 2 *
+               (CC_AES_KEY_SIZE_MAX / sizeof(u32))];
 };
 
 /* authentication and encryption with associated data class */
@@ -269,8 +269,8 @@ struct drv_ctx_aead {
        u8 key[CC_AES_KEY_SIZE_MAX];
        /* reserve to end of allocated context size */
        u32 reserved[CC_DRV_CTX_SIZE_WORDS - 8 -
-               3 * (CC_AES_BLOCK_SIZE/sizeof(u32)) -
-               CC_AES_KEY_SIZE_MAX/sizeof(u32)];
+               3 * (CC_AES_BLOCK_SIZE / sizeof(u32)) -
+               CC_AES_KEY_SIZE_MAX / sizeof(u32)];
 };
 
 /*******************************************************************/